You are on page 1of 99

Revise August 2

Chapter 11

Panko and Panko Business Data Networks and Security, 9th Edition
2013 Pearson

Chapter (s) Coverage


14 5 67 8 8 9 10 11 10 11 Core concepts and principles Single switched networks Single wireless networks Internets Internets Applications Wide Area Networks Applications

Layers
All 12 12 3 3 4 4 5 1-4 5
2

2013 Pearson

Basic Networked Application Concepts E-Mail Voice over IP HTTP and HTML Cloud Computing Service-Oriented Architectures Peer-to-Peer (P2P) Applications
2013 Pearson

Networked Applications
Applications that require a network to function, such as e-mail and the World Wide Web

Application Architectures
Where the processing is done Stand-alone operation Client/Server processing Cloud computing Service-Oriented Architectures (SOAs) Peer-to-peer (P2P) computing
4

2013 Pearson

Application Architectures
Critical to network design The newest architectures involve communication among multiple machines. Driven by Growing network throughput, availability, etc. Growing client processing power

2013 Pearson

2013 Pearson

Important Networked Applications


E-mail, voice over IP, the World Wide Web, cloud computing, peer-to-peer (P2P) computing, and mobile applications

Importance of the application layer to users


Contains all of the functionality that users see directly What happens at lower layers should simply happen
7

2013 Pearson

2013 Pearson

Terminal-Host v Client/Server Processing

E-Mail
Voice over IP HTTP and HTML Cloud Computing Service-Oriented Architectures Peer-to-Peer (P2P) Applications
2013 Pearson

Importance of E-Mail
Universal service on the Internet
Attachments deliver files

2013 Pearson

10

1. Each client PC has its own mail server.

2. Simple Mail Transfer Protocol for nearly instantaneous delivery


2013 Pearson

11

Post Office Protocol or Internet Message Access Protocol, for later receiver downloading
2013 Pearson

12

There are separate transmission and document standards.

Document standards: RFC 822/2822 for plain text messages. HTML bodies for formatting. UNICODE can represent text in any language.
2013 Pearson

13

Many applications have two types of standards.


Delivery standards
SMTP, POP, IMAP

Message format standards


RFC 822/2822, HTML, UNICODE It does no good to deliver messages if the receiver cannot understand them.

2013 Pearson

14

Either or both clients can use web-based e-mail instead of SMTP and POP or IMAP. All interactions for that client take place via HTTP instead. Message documents are HTML webpages.
HTML
SMTP POP/ IMAP SMTP 15

HTTP
2013 Pearson

SMTP Process Receiver

Command

Explanation

Sender

Receiver

220 When the sending host mail.panko.com establishes a TCP Ready session, the receiver signals that it is ready. HELO Sender indicates that it voyager.shilder. wishes to communicate. hawaii.edu 250 Receiver signals it is mail.panko.com ready to begin message.
16

2013 Pearson

SMTP Process Sender

Command

Explanation

MAIL FROM Sender identifies the mail david@voyager author. .shidler.hawaii. edu 250 OK Receiver signals that will accept a message from this person.

Receiver

2013 Pearson

17

SMTP Process Sender Receiver

Command RCTP TO: ray@panko.com 250 OK

Explanation Sender identifies a recipient. Receiver will accept mail for this recipient.

2013 Pearson

18

SMTP Process Sender

Command RCTP TO: lee@panko.com

Explanation Sender identifies a recipient.

Receiver

550 No such user here

Receiver will NOT accept mail for this recipient.

2013 Pearson

19

SMTP Process Sender

Command DATA

Explanation Message will follow.

Receiver

354 Start mail input; end with <CRLF> <CRLF>

Permission to send the message body.

2013 Pearson

20

SMTP Process Sender

Command When in the course 250 OK

Explanation Sends the body, which ends with a blank line. Accepts the body.

Receiver

2013 Pearson

21

SMTP Process Sender Receiver

Command QUIT 221 mail.panko.com Service closing transmission channel

Explanation Ending the connection. Receiver terminates the session.

2013 Pearson

22

Viruses, Worms, and Trojan Horses


Widespread problems; often delivered through email attachments
Use of antivirus software is almost universal, but only partially effective, given the number of malware infections. Antivirus programs are not limited to viruses. They scan for many types of malware.

2013 Pearson

23

Filtering in two or more locations gives defense in depth.


2013 Pearson

24

Terminal-Host v Client/Server Processing E-Mail

Voice over IP
HTTP and HTML Cloud Computing Service-Oriented Architectures Peer-to-Peer (P2P) Applications
2013 Pearson

25

Transmit voice telephone calls over IP networks Saves money because the company does not have to maintain separate internal voice and data networks Saves money because the voice signal is compressed as it is digitized

2013 Pearson

26

Signaling versus Transport


A core concept in telecommunications Telephony and video

Signaling
Setting up a connection, breaking it down afterward, billing, and so on

Transport
The actual transmission of the voice or video signal
27

2013 Pearson

Multimedia PC or VoIP telephone that plugs into an IP network (Internet)


2013 Pearson

28

Media gateway connects an IP network to the Public Switched Telephone Network. Handles both transport and signaling conversion.

2013 Pearson

29

SIP is a signaling protocol. This figures shows connection establishment.


2013 Pearson

30

Session Initiation Protocol Signaling Standard


Not just for initiating connections Opens connections

Closes connections
Handles charges and bookkeeping In other words, ALL signaling tasks

2013 Pearson

31

Transport takes place directly between the caller and called party.

2013 Pearson

32

UDP
There is no time to wait for the transmission of lost packets. UDP makes more sense because of its lightweight processing and traffic volume requirements.

Real-Time Protocol (RTP) Header


Makes up for two UDP limits. It adds sequence numbers. It adds a time stamp for when its codec octets should be played back.

2013 Pearson

33

Codecs translate analog voice to digital transmission signals.


Codec G.711 G.722 G.721 G.722.1 G.726 G.728 G.729AB G.723 G.723.1A Transmission Rate 64 kbps (initial telephony standard) 48, 56, 64 kbps 32 kbps In general, 24, 32 kbps greater 16, 24, 32, 40 kbps compression 16 kbps means poorer 8 kbps sound quality. 5.33, 6.4 kbps 5.3, 6.3 kbps
34

2013 Pearson

Terminal-Host v Client/Server Processing E-Mail Voice over IP

HTTP and HTML


Cloud Computing Service-Oriented Architectures Peer-to-Peer (P2P) Applications
2013 Pearson

35

Again, we see an application with transmission and document standards.


2013 Pearson

36

This webpage has text and two graphics. The HTML file has the text and tags for the graphics.
2013 Pearson

37

Based on tags in the HTML file, the graphics files are downloaded and rendered on the page.
2013 Pearson

38

Question: How many files will a browser have to download if the webpage has three graphics and plays music when it is downloaded?

2013 Pearson

39

HTTP Request Message


GET /panko/home.htm HTTP/5[CRLF]
Host: voyager.shidler.hawaii.edu[CRLF]

Note:
GET is the method. It asks for a file. /panko/home.htm is the path to the file. The browser speaks HTTP version 5. CRLF means carriage return/line feed. It means to start a new line.

2013 Pearson

40

HTTP Response Message:


HTTP/5 200 OK[CRLF]

200 and OK both mean that the request was complied with.

Date: Tuesday, 9-AUG-2013 18:32:15 GMT[CRLF] Server: name of server software[CRLF]

MIME-version: 1.0[CRLF]
Content-type: text/plain[CRLF] [CRLF] File to be downloaded. A string of bits that may

be text, graphics, sound, video, or other content.


41

2013 Pearson

Note that most fields (lines) have a variable name, a colon, and then the value of the variable. Example:
MIME-version: 1.0[CRLF]
MIME is a standard for describing file contents. The browser speaks MIME version 1.0.

This is like e-mail headers with To:, From:, and other fields
In fact, deliberately patterned after e-mail
42

2013 Pearson

Terminal-Host v Client/Server Processing E-Mail Voice over IP HTTP and HTML

Cloud Computing
Service-Oriented Architectures Peer-to-Peer (P2P) Applications
2013 Pearson

43

A Shared Project (Figure 11-15)


Google Docs Shea and Melinda can share documents.

Before, they had used e-mail attachments.


There was often confusion over who had the most recent version.

2013 Pearson

44

Before Google Docs, they used corporate servers running the corporate mail system.

2013 Pearson

45

With Google Docs, both the application program and data are on Google servers.

2013 Pearson

46

For users, showing the network as a cloud indicates that they do not have to understand it. In cloud computing, there is a second clouda cloud service provider.
In cloud computing, the company outsources some combination of servers, server applications, and client PC software to a cloud service provider. If client PC software is outsourced, the client PC needs only a browser.
47

2013 Pearson

Google Docs is a cloud provider of Software as a Service. Usually metered servicepay as you go.

2013 Pearson

48

Software as a Service
In Software as a Service (SaaS), an application service provider (ASP) supplies an application to customers on demand. In cloud SaaS, the user typically has a browser only. The application and data are downloaded to the client PC as needed. With cloud SaaS today, there is a broad range of applications available.
49

2013 Pearson

SaaS
Attractions of SaaS Reduces cost and risk because user only pays for software as needed

Saves money because company does not have to manage the application
Mobilityusers can access the software wherever there is Internet access Collaboration: sharing is easy
2013 Pearson

50

SaaS
Issues with SaaS If there is no Internet access, the application is unusable. Loss of control: may be locked into proprietary vendor software.

The cloud SaaS provider may go out of business.

2013 Pearson

51

SaaS
Issues with SaaS Security: will companys data be vulnerable if cloud service provider is attacked or has software vulnerabilities? Legal complications: if user company is required by law to be secure, how can this be satisfied with SaaS?

2013 Pearson

52

Cloud Utility Computing


In traditional utility computing, a company offloads server processing work to another company at a remote site. In cloud utility computing, the company that receives this processing job is a cloud service provider, and the data is sent over the Internet to be processed. Unlike in SaaS, the application is not managed by the cloud provideronly processing power and storage.

2013 Pearson

53

No SaaS Application
54

2013 Pearson

Attractions
No need to hire staff to run the servers
No need to purchase and manage servers

2013 Pearson

55

Attractions
Flexibilitycan get extra capacity quickly when needed for a short period of time

Scalabilitywill not outgrow the service providers capacity

Issues
As in cloud SaaS, loss of control and legal and security concerns

2013 Pearson

56

Why Is Cloud Utility Computing a Hot Topic Now?


Internet is now fast, reliable, and accessible nearly everywhere

Web services (discussed later)


Virtualization (discussed later)

2013 Pearson

57

Traditional Computer
User

User Application

Operating System

Hardware

2013 Pearson

58

Virtualized Computer
App 1a

Each operating system is like a separate computer.

App 3a

App 3b

OS 1

OS 2
Hypervisor Hardware

OS 3

2013 Pearson

59

Managing Cloud Computing


Many advantages
Loss of control Must consider security Must have Service Level Agreements (SLAs) for performance

2013 Pearson

60

Terminal-Host v Client/Server Processing E-Mail Voice over IP HTTP and HTML Cloud Computing

Service-Oriented Architectures
Peer-to-Peer (P2P) Applications
2013 Pearson

61

Service-Oriented Architectures (SOAs)


Traditionally, in client/server computing, a single client program calls a single server program. In service-oriented architectures, a client program may contact many small service objects on many different machines to do the work the client needs. In addition, a service object may serve multiple clients. Service objects usually do small chunks of work, like computing a currency exchange rate.

2013 Pearson

62

Calling Program Service Object (Provides Service) Call

Call

Call

2013 Pearson

63

SOAs use requests and responses.

2013 Pearson

64

Service objects provide services to programs that call them.


SOAs are languageindependent. The calling program and the service objects may be written in different languages.

2013 Pearson

65

Individual service objects can provide service to multiple calling programs.

2013 Pearson

66

SOAP-Based SOAs

Web services SOAs


All SOAs

SOA is the general concept.


67

2013 Pearson

SOAP-Based SOAs

Web services SOAs


All SOAs
Web service SOAs are SOAs that use WWW standards such as HTTP
2013 Pearson

68

SOAP-Based SOAs

Web services SOAs


All SOAs
SOAP-Based SOAs are Web services that use the SOAP message syntax
2013 Pearson

69

SOAP is a common way to format requests for services and responses.


Simple Object Access Protocol Quite simply, a general way to access (use) service objects Specifically, SOAP standardizes the syntax of request and response message syntax and semantics in SOA interactions.

2013 Pearson

70

SOAP messages are written in XML instead of HTML.


In HTML, you cannot create your own tags.

In XML (eXtensible Markup Language), communities can add their own tags.

SOAP messages can be delivered by


HTTP, e-mail, and so on

2013 Pearson

71

SOAP Request Message


<SOAP Envelope>

XML Tag

<Soap BODY> <Service=PriceQuote> <PartNum>T2000</PartNum> <Quantity>47</Quantity> <Shipping>Rush</Shipping> </Service=PriceQuote> </SOAP BODY> </SOAP Envelope>
72

2013 Pearson

SOAP Response Message


<SOAP Envelope> <Soap Body>

<Service=PriceQuote>
<Price>$25,892</Price> </Service=PriceQuote> </SOAP BODY>

</SOAP Envelope>
73

2013 Pearson

UDDI
Problem: How do you find the Web services you need? Universal Description, Discovery, and Integration Allows calling program to find a suitable Web service Like a telephone directory Yellow pages: find by category of service White pages: find by name
74

2013 Pearson

WSDL
Problem: How do you use a particular Web service? Web Service Description Language (WSDL) Describes how to use a specific Web service User first decides what Web service to use User then sends a WSDL request to the vendor of the Web service The WSDL response describes how to use the Web service

2013 Pearson

75

Terminal-Host v Client/Server Processing E-Mail Voice over IP HTTP and HTML Cloud Computing Service-Oriented Architectures

Peer-to-Peer (P2P) Applications


2013 Pearson

76

Clients provide services to other clients.


Servers are not used or are used only for secondary tasks such as helping a client find another client. Made possible by growing desktop processing power
Terminal-Host: no desktop processing power Client/server: some desktop processing power P2P: extensive desktop processing power

2013 Pearson

77

2013 Pearson

78

2013 Pearson

79

In traditional client/server file retrieval, a request is sent directly to the server containing the file.
80

2013 Pearson

PCs share files with one another.

2013 Pearson

81

BitTorrent is a sophisticated PC file sharing standard. The client first contacts an index webserver with a file request.

2013 Pearson

82

The index server directs the client to a tracker server.

2013 Pearson

83

The swarm consists of client PCs that have parts of the desired file.

2013 Pearson

84

4. Client PC downloads pieces from the swarm.

5. Client PC reassembles the file.


2013 Pearson

85

Question: What do you think is the advantage of downloading the file from multiple sources instead of a single source?

2013 Pearson

86

Description and Main Features


P2P VoIP service Very popular due to low costs Free calling among Skype customers (computerto-computer) Reduced-cost calling to and from Public Switched Telephone Network customers

2013 Pearson

87

Recap

Signaling versus Transport


Signaling Supervisory communication Set up connection, break down connection Billing, and so on Transport

The actual carriage of voice signals between the caller and the called party

2013 Pearson

88

How Skype Works


Skype Network Skype login server: the only centralized component in the Skype network Host node: a Skype application that runs on a users computer

Super node: a host node that takes on the work of signaling

2013 Pearson

89

Users must log into the network before they receive service.

2013 Pearson

90

Call set-up signaling is done P2P via supernodes, which are powerful user computers.

Powerful clients automatically become supernodes.


91

2013 Pearson

Once connected, signaling ends

The two parties communicate entirely via P2P.


This is transport. So most transmission is P2P.
2013 Pearson

92

Skype Security
Many corporations ban use of Skype because: Skypes proprietary software and protocols are not revealed to security professionals, change frequently. Detailed method of Skype encryption is unknown.

2013 Pearson

93

Skype Security
Many corporations ban use of Skype because: Registration is open and uncontrolled, so usernames mean nothing from a security standpoint. Skype is almost impossible to control at firewalls. Skypes file transfer mechanism does not work with most antivirus products.
94

2013 Pearson

Stage Registration

Skype Server-based

Traditional VoIP Server-based

Signaling
Transport

P2P
P2P

Server-based
P2P

Skype differs from traditional P2P only in signaling. Signaling costs are borne by Supernodes
95

2013 Pearson

SETI@home uses idle PC processing power.


2013 Pearson

96

Made possible by growing desktop processing power on PCs Types


File sharing

Communication
Processor sharing

Potential cost savings by using idle PC resources Management and security issues
97

2013 Pearson

Terminal-Host v Client/Server Processing E-Mail Voice over IP HTTP and HTML Cloud Computing Service-Oriented Architectures Peer-to-Peer (P2P) Architecture
2013 Pearson

98

2013 Pearson

99

You might also like